Blog

Affichage de 1-10 sur 29 éléments.

How to implement subscription and pay-per-use licensing with dongles

Subscription and pay-per-use licensing models are becoming increasingly popular. They are attractive to customers, who only pay for software or services that they actively use, and they are popular with software vendors because they provide opportunities to fully monetise software.

Lire plus…

Solving the lost dongle problem

Martin Payne |
Dinkey Pro/FD DinkeyOMS

If a customer reports that a dongle is lost or stolen, are they telling the truth or trying to get an extra licence? How can you balance good customer service with protecting your revenue?

Lire plus…

A guide to software licensing

This article explains the most common software licensing models and lists various ways you can enforce your software licence terms and conditions. Particular focus is given to how software protection systems can control the use of your software and the number of copies allowed.

Lire plus…

MFA using USB security keys

USB MFA security keys are physical authentication devices that provide an additional layer of security beyond traditional passwords. They work using cryptographic protocols and by requiring the user to physically interact with the device in order to verify their identity.

Lire plus…

eID for German Savings Banks Using the Feitian bR500 with Electronic ID Cards

Nick Smith |
Authentification e-ID Smart Card Readers

In conjunction with S-Markt & Mehrwert savings banks in Germany can provide secure and convenient eID processes for their customers. The Feitian bR500 Bluetooth smart card reader makes this process possible on tablets and mobile.

Lire plus…

Qu’est-ce que l’authentification FIDO ?

Nick Smith |
Authentification e-ID FIDO

FIDO, qui signifie Fast IDentity Online (Identification rapide en ligne) est un ensemble de normes d’authentification visant à renforcer le processus de connexion des utilisateurs aux services en ligne. Ces normes sont élaborées par l’Alliance FIDO et favorisent des processus d’authentification plus rapides et plus sûrs, l’objectif global étant d’éliminer complètement les connexions par mot de passe.

Lire plus…

Smartphone app for programming OATH OTP tokens via NFC

We are pleased to announce the release of our smartphone app for programming OATH OTP tokens. Using an NFC-enabled smartphone our programmable tokens can be flashed with new secret keys and settings. This allows hardware tokens to be used as a replacement for authenticator apps for 2FA/MFA on platforms including Microsoft Azure, Office365, AWS and Google.

Lire plus…

Dinkey Pro/FD version 7.6 released

The latest Dinkey Pro/FD release introduces support for Apple silicon.

Lire plus…

Ouverture de session Windows par carte à puce avec les cartes et tokens PKI Feitian ePass2003

Nick Smith |
Authentification PKI Cartes à puce

L’ouverture de session Windows à l’aide de cartes à puce et de tokens améliore considérablement la sécurité de la connexion pour les comptes d’utilisateurs du domaine. Le présent article donne un aperçu de la connexion par carte à puce et des options matérielles disponibles chez Microcosm.

Lire plus…

How to protect your software intellectual property

Martin Payne |
Protection de l’IP Protection de logiciel

You have invested a significant amount of time and creativity in writing your killer application but you are worried about a competitor or hacker reverse-engineering your software and stealing your intellectual property. What is the best way to protect it?

Lire plus…